blob: 3e7f228b22e17bf5e011402b9518cfdef41b697d [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001# SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002config STATIC_LINK
3 bool "Force a static link"
4 default n
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 help
Jeff Dike4c9e1382007-10-16 01:26:54 -07006 This option gives you the ability to force a static link of UML.
7 Normally, UML is linked as a shared binary. This is inconvenient for
8 use in a chroot jail. So, if you intend to run UML inside a chroot,
9 you probably want to say Y here.
10 Additionally, this option enables using higher memory spaces (up to
11 2.75G) for UML.
Linus Torvalds1da177e2005-04-16 15:20:36 -070012
Dave Hansen3f22ab22005-06-23 00:07:43 -070013source "mm/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070014
15config LD_SCRIPT_STATIC
16 bool
17 default y
Jeff Dike42fda662007-10-16 01:26:50 -070018 depends on STATIC_LINK
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
20config LD_SCRIPT_DYN
21 bool
22 default y
23 depends on !LD_SCRIPT_STATIC
Thomas Meyer39940db2017-08-20 13:26:05 +020024 select MODULE_REL_CRCS if MODVERSIONS
Linus Torvalds1da177e2005-04-16 15:20:36 -070025
Linus Torvalds1da177e2005-04-16 15:20:36 -070026source "fs/Kconfig.binfmt"
27
28config HOSTFS
29 tristate "Host filesystem"
30 help
Jeff Dike4c9e1382007-10-16 01:26:54 -070031 While the User-Mode Linux port uses its own root file system for
32 booting and normal file access, this module lets the UML user
33 access files stored on the host. It does not require any
34 network connection between the Host and UML. An example use of
35 this might be:
Linus Torvalds1da177e2005-04-16 15:20:36 -070036
Jeff Dike4c9e1382007-10-16 01:26:54 -070037 mount none /tmp/fromhost -t hostfs -o /tmp/umlshare
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Jeff Dike4c9e1382007-10-16 01:26:54 -070039 where /tmp/fromhost is an empty directory inside UML and
40 /tmp/umlshare is a directory on the host with files the UML user
41 wishes to access.
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
Jeff Dike4c9e1382007-10-16 01:26:54 -070043 For more information, see
44 <http://user-mode-linux.sourceforge.net/hostfs.html>.
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Jeff Dike4c9e1382007-10-16 01:26:54 -070046 If you'd like to be able to work with files stored on the host,
47 say Y or M here; otherwise say N.
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
Linus Torvalds1da177e2005-04-16 15:20:36 -070049config MCONSOLE
50 bool "Management console"
Richard Weinberger1eb7c6c2015-05-31 23:27:26 +020051 depends on PROC_FS
Linus Torvalds1da177e2005-04-16 15:20:36 -070052 default y
53 help
Jeff Dike4c9e1382007-10-16 01:26:54 -070054 The user mode linux management console is a low-level interface to
55 the kernel, somewhat like the i386 SysRq interface. Since there is
56 a full-blown operating system running under every user mode linux
57 instance, there is much greater flexibility possible than with the
58 SysRq mechanism.
Linus Torvalds1da177e2005-04-16 15:20:36 -070059
Jeff Dike4c9e1382007-10-16 01:26:54 -070060 If you answer 'Y' to this option, to use this feature, you need the
61 mconsole client (called uml_mconsole) which is present in CVS in
62 2.4.5-9um and later (path /tools/mconsole), and is also in the
63 distribution RPM package in 2.4.6 and later.
Linus Torvalds1da177e2005-04-16 15:20:36 -070064
Jeff Dike4c9e1382007-10-16 01:26:54 -070065 It is safe to say 'Y' here.
Linus Torvalds1da177e2005-04-16 15:20:36 -070066
67config MAGIC_SYSRQ
68 bool "Magic SysRq key"
69 depends on MCONSOLE
Jeff Dike4c9e1382007-10-16 01:26:54 -070070 help
71 If you say Y here, you will have some control over the system even
72 if the system crashes for example during kernel debugging (e.g., you
73 will be able to flush the buffer cache to disk, reboot the system
74 immediately or dump some status information). A key for each of the
75 possible requests is provided.
Linus Torvalds1da177e2005-04-16 15:20:36 -070076
Jeff Dike4c9e1382007-10-16 01:26:54 -070077 This is the feature normally accomplished by pressing a key
78 while holding SysRq (Alt+PrintScreen).
Linus Torvalds1da177e2005-04-16 15:20:36 -070079
Jeff Dike4c9e1382007-10-16 01:26:54 -070080 On UML, this is accomplished by sending a "sysrq" command with
81 mconsole, followed by the letter for the requested command.
Linus Torvalds1da177e2005-04-16 15:20:36 -070082
Jeff Dike4c9e1382007-10-16 01:26:54 -070083 The keys are documented in <file:Documentation/sysrq.txt>. Don't say Y
84 unless you really know what this hack does.
Linus Torvalds1da177e2005-04-16 15:20:36 -070085
Linus Torvalds1da177e2005-04-16 15:20:36 -070086config KERNEL_STACK_ORDER
87 int "Kernel stack size order"
Jeff Dike02239c22007-05-10 22:22:35 -070088 default 1 if 64BIT
Jeff Dikee80ad9b2007-06-08 13:46:49 -070089 range 1 10 if 64BIT
Jeff Dike02239c22007-05-10 22:22:35 -070090 default 0 if !64BIT
Linus Torvalds1da177e2005-04-16 15:20:36 -070091 help
Jeff Dike4c9e1382007-10-16 01:26:54 -070092 This option determines the size of UML kernel stacks. They will
93 be 1 << order pages. The default is OK unless you're running Valgrind
94 on UML, in which case, set this to 3.
FUJITA Tomonorid9112022010-10-26 14:22:18 -070095
Al Virod805a782011-08-18 20:13:00 +010096config MMAPPER
97 tristate "iomem emulation driver"
98 help
99 This driver allows a host file to be used as emulated IO memory inside
100 UML.
101
FUJITA Tomonorid9112022010-10-26 14:22:18 -0700102config NO_DMA
103 def_bool y
Kirill A. Shutemov6b8ce2a2015-04-14 15:46:11 -0700104
105config PGTABLE_LEVELS
106 int
107 default 3 if 3_LEVEL_PGTABLES
108 default 2
Mickaël Salaünc50b4652015-12-29 21:35:47 +0100109
110config SECCOMP
111 def_bool y
112 prompt "Enable seccomp to safely compute untrusted bytecode"
113 ---help---
114 This kernel feature is useful for number crunching applications
115 that may need to compute untrusted bytecode during their
116 execution. By using pipes or other transports made available to
117 the process as file descriptors supporting the read/write
118 syscalls, it's possible to isolate those applications in
119 their own address space using seccomp. Once seccomp is
120 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
121 and the task is only allowed to execute a few safe syscalls
122 defined by each seccomp mode.
123
124 If unsure, say Y.